![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
login - The Usenix Magazine, Volume 28
Volume 28, Number 1, February 2003
- Rob Kolstad:
MOTD. - Tina Darmohray:
Letters to the Editor.
- John Nicholson:
Common Problems with Outsourcing Deals and How to Avoid Them.
- Glen McCluskey:
An Introduction to C#. - Clif Flynt:
The Tclsh Spot. - Adam Turoff:
Practical Perl: CPAN, Modules, and the CPAN SHELL.
- Rik Farrow:
Musings. - Peleus G. Uhley:
Web Browser Vulnerabilities 101.
- Strata R. Chalup:
Will the Real "Sysadmin of the Future" Please Stand Up? - Steven M. Tylock:
Confessions of a Sysadmin Turned Salesman. - Robert Haskins:
ISPadmin: Service Provider Book Reviews. - Steve Simmons:
Symlinks and Hard Links Don't Belong in /etc. - Jozef Skvarcek:
Remote Monitoring with SNMP: A Practical Example.
- Greg Hankins:
Introduction to the Border Gateway Protocol.
- Peter H. Salus:
The Bookworm.
Volume 28, Number 2, April 2003
- Rob Kolstad:
MOTD.
- Dan Geer:
Comments of the National Strategy to Secure Cyberspace.
- Timo Sivonen:
IPv6 Configuration on Solaris 9 and freeBSD-4.x.
- Glen McCluskey:
Examining the C# "Hello World" Program. - Clif Flynt:
The Tclsh Spot. - Adam Turoff:
Practical Perl: Fixing Broken Modules.
- Rik Farrow:
Musings. - Tina Darmohray:
Hacking for Fun and Profit. - Anton Chuvakin:
Ups and Downs of UNIX/Linux Host-Based Security Solutions.
- Strata R. Chalup:
Not on My Watch! Filtering Options Revisited. - Stephen Pierzchala:
Compressing Web Output Using mod_gzip and Apache.
- Ray Swartz:
Isn't That a Little Risky?
- Peter H. Salus:
The Bookworm.
Volume 28, Number 3, June 2003
- Rob Kolstad:
MOTD.
- Kragen Sitaker:
Microsoft: What's Next? - Dan Geer:
Getting the Problem Statement Right.
- Travis Howard:
.profile.
- Glen McCluskey:
C# Types. - Kragen Sitaker:
Non-Proprietary Flash Solutions. - Clif Flynt:
The Tclsh Spot: Capturing and Analyzing IP Packets on the AX-4000 Using AxTcl. - Adam Turoff:
Practical Perl: Keeping it Simple.
- Rik Farrow:
Musings.
- Diomidis D. Spinellis:
Organized Pruning of File Sets. - Robert Haskins, Rob Kolstad:
ISPadmin: Bayesian Spam-Filtering Techniques. - Steven M. Tylock:
Private, HMO, and Group Support.
- John Nicholson:
Trends in the Outsourcing Industry. - Erin Kenneally:
Put Your Data Where Your Mouth Is.
- Peter H. Salus:
The Bookworm ; Twenty Years Ago in USENIX.
Volume 28, Number 4, August 2003
- Rob Kolstad:
MOTD.
- Adam Moskowitz:
On Choosing Usernames.
- Nimrod Megiddo, Dharmendra S. Modha:
One Up on LRU.
- Tina Darmohray, Dan Appelman:
What's in a Name?
- Ian Lumb:
Production HPC Reinvented.
- Rik Farrow:
Musings.
- Robert Haskins:
ISPadmin: Service Provider Book Reviews II. - Dan Geer:
Patch Work. - Matthew Hoskins:
Oracle Hot Backup.
- Glen McCluskey:
Working with C# Classes. - Clif Flynt:
The Tclsh Spot: Monitor Your System with expect. - Adam Turoff:
Practical Perl: Cleaning Up with Modules.
- Ray Swartz:
Where Can I Find a Good Investment?
- Andrew Josey:
Updates.
- Peter H. Salus:
The Bookworm; Twenty-Five Years Ago in UNIX.
Volume 28, Number 5, October 2003
- Rob Kolstad:
MOTD.
- Tina Darmohray:
Value Added.
- Ryan Kereliuk:
Introducing Voice Over Internet Protocol Technology.
- Rik Farrow:
Musings.
- Robert Haskins:
ISPadmin: Managing and Providing ISP Services. - Adam Moskowitz:
"Eat Your Own Dog Food".
- Glen McCluskey:
Using C# Properties and Static Members. - Clif Flynt:
The Tclsh Spot: Client Server Sockets. - Adam Turoff:
Practical Perl: Using Object Factories.
- Peter H. Salus:
The Bookworm; Networking Anniversaries.
Volume 28, Number 6, December 2003
- Rik Farrow:
In this Issue.
- Tom Perrine:
The End of crypt() Passwords ... Please? - Chris Wysopal:
Learning Security QA from the Vulnerability Researchers. - Jason Damron:
Identifiable Fingerprints in Network Applications. - Edward Balas:
Sebek: Covert Glass-Box Host Analysis. - Markus Jakobsson, Filippo Menczer:
Untraceable Email Cluster Bombs. - Mudge:
Insider Threat. - Abe Singer:
Life Without Firewalls. - Renaud Deraison, Ron Gula:
Nessus. - Dario V. Forte:
Coordinated Incident Response Procedures. - Ryan Russell:
How Are We Going to Patch All These Boxes? - Erin Kenneally:
Evidence Enhancing Technology.
- Peter H. Salus:
The Bookworm; Nearly 20 Years Ago in U[SE]NIX.
- Ellie Young:
2004 Election for Board of Directors.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.